# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d67b79ba2127783908e043af97a22387db7a8fe51f16abe6bf178e7d878f320c
Pseudo Output
1a6a48531ecd78d6e1aed4b7fcd68179d98612d3093a04a97ba4f50e2bda5065
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
74f164533e2dc46a399303d5d25c55cb1f5e63bb90e171410f55b4bc995d5d6d
Commitment
f27f8481a8d69f170b23430b521743d0ff75866d0b8c181b7b7b9a7eed10274b
Range Proof
672 bytes (Bulletproof)
Memo
ba1f47867c3bb9208c646551dfce83096bdad72de9c0d882fab085ffbe327a39169117946feb965aeddf7756bfef42edcb9bdba465b1bb55a30839449384b972d8ba74c1a23a120232cb36f7bd0208e5d7e0110520bf6e8e038b77dd4c7678745df0a4a43c5260636afd1b2d8ca6bdd4b1807bd4976490b355c1d87891b81a4c (encrypted)
Stealth Address
38fd74a3bc7a1b7efb82deef9b33ad9e3b2bdc83fc62d497e45c2569f60a1579
Commitment
ce54498a0ef1a680533b2013afc67fdab2df08b3776277a036ae35364d29bf33
Range Proof
672 bytes (Bulletproof)
Memo
525117c67d9bee086f346bbfcac5c78e056b072bac1787ae7353a1a61e72562dbd17dfe134dce18b11b2cd9553487c3dfde896da1d376a422472448ada8e8f4f8f78c1b2ee0fc64328a1b1bbc5ccf3699ca3344762394dc893b0969ec447dea947ec2d78ff97ea05a59f45ff93b196e82c172b426ea24494fa1e1f64c94340b1 (encrypted)
Stealth Address
12c36c24484a871a7aa23246b828d3a82a1c4e31185e16d6d5f6db3c79481179
Commitment
f6e8c134c790b7ccb3a03579254af1de40948533e6c6ea523fc14265de187b63
Range Proof
672 bytes (Bulletproof)
Memo
1037ad54ab4fade2317e1b462bcfec007d865d9a39f1c95ca0ca0d54a8567f5b231fee3facfd1fed1b899e097fa0235d285b802c90f02eefef650437b9b4889b5c3f27a7854decfa371adec3542e3abca9e21ce4ba7ef83a0aaa6a428d08d9a31e542dd3b75f1b3e6cfbd8f8dc4524748dcb4e7ba825b1f50331d0d11c7df8a2 (encrypted)